Unlock instant, AI-driven research and patent intelligence for your innovation.

Server pool Kerberos authentication scheme

a server pool and authentication scheme technology, applied in the field of server pool kerberos authentication scheme, can solve the problems of reducing the security of the server pool, increasing the manageability of the server,

Inactive Publication Date: 2007-06-07
INTEL CORP
View PDF27 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

Enables secure authentication of clients against a pool of servers, enhancing security and manageability by allowing load balancing without compromising the entire server pool's security, as each server's secret key can be independently managed.

Problems solved by technology

This technique, however, increases the manageability of the servers, for example, all server passwords must by synchronized, and decreases the security of the server pool, for example, compromising one server eases the compromising of the rest of the server pool.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Server pool Kerberos authentication scheme
  • Server pool Kerberos authentication scheme
  • Server pool Kerberos authentication scheme

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] In the following detailed description, numerous details are set forth in order to provide a thorough understanding of the present disclosed subject matter. However, it will be understood by those skilled in the art that the disclosed subject matter may be practiced without these specific details. In other instances, well-known methods, procedures, components, and circuits have not been described in detail so as to not obscure the disclosed subject matter.

[0020] Kerberos is a trusted third-party authentication protocol designed for client / server interactions. J. Kohl and B. Neuman, “The Kerberos network authentication service (version 5),” RFC-1510, 1993. Hereafter, a service that is substantially in compliance with the above Kerberos specification, its derivatives, or antecedents is simply referred to as “Kerberos.” This includes imperfect or corrupted implementations.

[0021]FIG. 2 is a flowchart illustrating an embodiment of a technique for generating a Service Ticket to fa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present disclosure relates to the authenticating a client against a pool of servers utilizing a secure authentication protocol, and, more specifically, to the authenticating a client against a pool of servers providing a common service, utilizing the Kerberos secure authentication protocol.

Description

[0001] This U.S. patent application is a Divisional of U.S. patent application Ser. No. filed 10 / 696,443 filed Oct. 28, 2003.BACKGROUND [0002] 1. Field [0003] The present disclosure relates to the authenticating a client against a pool of servers utilizing a secure authentication protocol, and, more specifically, to the authenticating a client against a pool of servers providing a common service, utilizing the Kerberos secure authentication protocol. [0004] 2. Background Information [0005] Kerberos is a trusted third-party authentication protocol designed for client / server interactions. J. Kohl and B. Neuman, “The Kerberos network authentication service (version 5),” RFC-1510, 1993. Hereafter, a service that is substantially in compliance with the above Kerberos specification, its derivatives, or antecedents is simply referred to as “Kerberos.” This includes imperfect or corrupted implementations. [0006] A Kerberos service allows a person or client to access different machines on a ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): H04L9/00H04L9/08H04L29/06
CPCG06Q20/382H04L9/0822H04L9/083H04L9/3213G06F21/33H04L63/065H04L63/0807H04L63/0823H04L63/045
Inventor GROBMAN, STEVEN L.
Owner INTEL CORP